ISACA CISA practice exam questions with
complete solutions 2024
Abend j- jANS✓✓-An jabnormal jend jto ja jcomputer jjob; jtermination jof ja jtask
jprior jto jits jcompletion jbecause jof jan jerror jcondition jthat jcannot jbe jresolved
jby jrecovery jfacilities jwhile jthe jtask jis jexecuting
Acceptable jUse jPolicy j- jANS✓✓-A jpolicy jthat jestablishes jan jagreement
jbetween jusers jand jthe jenterprise jand jdefines jfor jall jparties' jthe jranges jof juse
jthat jare japproved jbefore jgaining jaccess jto ja jnetwork jor jthe jInternet.
Access jControl j- jANS✓✓-The jprocesses, jrules jand jdeployment jmechanisms
jthat jcontrol jaccess jto jinformation jsystems, jresources jand jphysical jaccess jto
jpremises
Access jControl jList j(ACL) j- jANS✓✓-An jinternal jcomputerized jtable jof jaccess
jrules jregarding jthe jlevels jof jcomputer jaccess jpermitted jto jlogon jIDs jand
jcomputer jterminals. jAlso jreferred jto jas jaccess jcontrol jtables.
Access jcontrol jtable j- jANS✓✓-An jinternal jcomputerized jtable jof jaccess jrules
jregarding jthe jlevels jof jcomputer jaccess jpermitted jto jlogon jIDs jand jcomputer
jterminals
Access jMethod j- jANS✓✓-The jtechnique jused jfor jselecting jrecords jin ja jfile,
jone jat ja jtime, jfor jprocessing, jretrieval jor jstorage. jThe jaccess jmethod jis
jrelated jto, jbut jdistinct jfrom, jthe jfile jorganization, jwhich jdetermines jhow jthe
jrecords jare jstored.
Access jPath j- jANS✓✓-The jlogical jroute jan jend juser jtakes jto jaccess
jcomputerized jinformation. jTypically, jit jincludes ja jroute jthrough jthe joperating
jsystem, jtelecommunications jsoftware, jselected japplication jsoftware jand jthe
jaccess jcontrol jsystem.
Access jrights j- jANS✓✓-The jpermission jor jprivileges jgranted jto jusers,
jprograms jor jworkstations jto jcreate, jchange, jdelete jor jview jdata jand jfiles
jwithin ja jsystem, jas jdefined jby jrules jestablished jby jdata jowners jand jthe
jinformation jsecurity jpolicy
Access jServers j- jANS✓✓-Provides jcentralized jaccess jcontrol jfor jmanaging
jremote jaccess jdial-up jservices
,jjjj
Address j- jANS✓✓-Within jcomputer jstorage, jthe jcode jused jto jdesignate jthe
jlocation jof ja jspecific jpiece jof jdata
Address jSpace j- jANS✓✓-The jnumber jof jdistinct jlocations jthat jmay jbe jreferred
jto jwith jthe jmachine jaddress. jFor jmost jbinary jmachines, jit jis jequal jto j2n,
jwhere jn jis jthe jnumber jof jbits jin jthe jmachine jaddress.
Addressing j- jANS✓✓-The jmethod jused jto jidentify jthe jlocation jof ja jparticipant
jin ja jnetwork. jIdeally, jaddressing jspecifies jwhere jthe jparticipant jis jlocated
jrather jthan jwho jthey jare j(name) jor jhow jto jget jthere j(routing).
Administrative jcontrols j- jANS✓✓-The jrules, jprocedures jand jpractices jdealing
jwith joperational jeffectiveness, jefficiency jand jadherence jto jregulations jand
jmanagement jpolicies.
Adware j- jANS✓✓-A jsoftware jpackage jthat jautomatically jplays, jdisplays jor
jdownloads jadvertising jmaterial jto ja jcomputer jafter jthe jsoftware jis jinstalled jon
jit jor jwhile jthe japplication jis jbeing jused. jIn jmost jcases, jthis jis jdone jwithout
jany jnotification jto jthe juser jor jwithout jthe juser's jconsent. jThe jterm jadware
jmay jalso jrefer jto jsoftware jthat jdisplays jadvertisements, jwhether jor jnot jit jdoes
jso jwith jthe juser's jconsent; jsuch jprograms jdisplay jadvertisements jas jan
jalternative jto jshareware jregistration jfees. jThese jare jclassified jas jadware jin jthe
jsense jof jadvertising jsupported jsoftware, jbut jnot jas jspyware. jAdware jin jthis
jform jdoes jnot joperate jsurreptitiously jor jmislead jthe juser jand jprovides jthe
juser jwith ja jspecific jservice.
Alpha j- jANS✓✓-The juse jof jalphabetic jcharacters jor jan jalphabetic jcharacter
jstring
Alternative jrouting j- jANS✓✓-A jservice jthat jallows jthe joption jof jhaving jan
jalternate jroute jto jcomplete ja jcall jwhen jthe jmarked jdestination jis jnot javailable.
jIn jsignaling, jalternate jrouting jis jthe jprocess jof jallocating jsubstitute jroutes jfor
ja jgiven jsignaling jtraffic jstream jin jcase jof jfailure(s) jaffecting jthe jnormal
jsignaling jlinks jor jroutes jof jthat jtraffic jstream.
Which jof jthe jfollowing jis jthe jBEST jperformance jindicator jfor jthe jeffectiveness
jof jan jincident jmanagement jprogram?
A. jIncident jalert jmeantime
B. jNumber jof jincidents jreported
C. jAverage jtime jbetween jincidents
D. jIncident jresolution jmeantime j- jANS✓✓-D. jIncident jresolution jmeantime
Backups jwill jMOST jeffectively jminimize ja jdisruptive jincident's jimpact jon ja
jbusiness jif jthey jare:
, jjjj
A. jtaken jaccording jto jrecovery jpoint jobjectives j(RPOs).
B. jscheduled jaccording jto jthe jservice jdelivery jobjectives.
C. jperformed jby jautomated jbackup jsoftware jon ja jfixed jschedule.
D. jstored jon jwrite-once jread-many jmedia. j- jANS✓✓-B. jscheduled jaccording jto
jthe jservice jdelivery jobjectives
An jIS jaudit jreveals jthat jan jorganization jis jnot jproactively jaddressing jknown
jvulnerabilities. jWhich jof jthe jfollowing jshould jthe jIS jauditor jrecommend jthe
jorganization jdo jFIRST?
A. jEnsure jthe jintrusion jprevention jsystem j(IPS) jis jeffective.
B. jVerify jthe jdisaster jrecovery jplan j(DRP) jhas jbeen jtested.
C. jAssess jthe jsecurity jrisks jto jthe jbusiness.
D. jConfirm jthe jincident jresponse jteam junderstands jthe jissue. j- jANS✓✓-C.
jAssess jthe jsecurity jrisks jto jthe jbusiness
An jIS jauditor jhas jcompleted jthe jfieldwork jphase jof ja jnetwork jsecurity jreview
jand jis jpreparing jthe jinitial jdraft jof jthe jaudit jreport. jWhich jof jthe jfollowing
jfindings jshould jbe jranked jas jthe jHIGHEST jrisk?
A. jNetwork jpenetration jtests jare jnot jperformed.
B. jThe jnetwork jfirewall jpolicy jhas jnot jbeen japproved jby jthe jinformation
jsecurity jofficer.
C. jNetwork jfirewall jrules jhave jnot jbeen jdocumented.
D. jThe jnetwork jdevice jinventory jis jincomplete. j- jANS✓✓-D. jThe jnetwork jdevice
jinventory jis jincomplete.
Which jof jthe jfollowing jis jthe jPRIMARY jadvantage jof jparallel jprocessing jfor ja
jnew jsystem jimplementation?
A. jAssurance jthat jthe jnew jsystem jmeets jfunctional jrequirements
B. jSignificant jcost jsavings jover jother jsystem jimplementation japproaches
C. jMore jtime jfor jusers jto jcomplete jtraining jfor jthe jnew jsystem
D. jAssurance jthat jthe jnew jsystem jmeets jperformance jrequirements j- jANS✓✓-
A. jAssurance jthat jthe jnew jsystem jmeets jfunctional jrequirements
During jan jinternal jaudit jof jautomated jcontrols, jan jIS jauditor jidentifies jthat jthe
jintegrity jof jdata jtransfer jbetween jsystems jhas jnot jbeen jtested jsince
jsuccessful jimplementation jtwo jyears jago. jWhich jof jthe jfollowing jshould jthe
jauditor jdo jNEXT?
A. jReview jprevious jsystem jinterface jtesting jrecords.
B. jDocument jthe jfinding jin jthe jaudit jreport.
C. jReview jrelevant jsystem jchanges.
D. jReview jIT jtesting jpolicies jand jprocedures. j- jANS✓✓-C. jReview jrelevant
jsystem jchanges.